Currently Empty: $0.00
Ethical Hacking Essentials E|HE
Course Description
Ethical Hacking Essentials is an introductory cybersecurity course that covers ethical hacking and penetration testing fundamentals and prepares learners for a career in cybersecurity. This ethical hacking course will introduce learners to computer and network security concepts such as threats and vulnerabilities, password cracking, web application attacks, loT and OT attacks, cloud computing, pentesting fundamentals, and more. EC-Council’s ethical hacking essentials course provides hands-on practical experience to learners, thus giving them the skills necessary for a future in cybersecurity. Put your newly acquired abilities to the test with an exhilarating Capture the Flag (CTF) Exercise seamlessly integrated in our Capstone project. This CTF is seamlessly integrated by live virtual machines, genuine software, and real networks, all delivered within a secure and regulated sandbox environment. With these exclusive hands-on, human-versus-machine CTF challenges you will develop the hands-on proficiencies essential for success in your cyber professional role.
E|HE-certified learners have an assured means of formal recognition to add to their resumes and show off their expertise and skills to prospective employers. This improves their prospects for employment advancement, higher salaries, and greater job satisfaction. If you are looking to learn advance ethical hacking click here: Ethical Hacking Certification (Certified Ethical Hacker C|EH)
Ethical Hacking Essentials Program Information
Who is it for?
What Skills You’ll Learn
Exam Details
Key Features
Brochure
Who is it for?
- School students, fresh graduates, Professionals, Career starters and switchers, IT / Technology / Cybersecurity teams with little or no work experience.
- Anyone who wants to start their cybersecurity career and master the fundamentals of security online.
- Anyone who wants to prepare for a cybersecurity career and aid their IT education.
- Professionals who want to get into the cybersecurity field but are unsure where to start their education journey.
What Skills You’ll Learn
- Key issues plaguing the information security world and information security laws and standards.
- Fundamentals of ethical hacking
- Information security threats and vulnerabilities
- Different types of malware
- Different types of password-cracking techniques and countermeasures
- Social engineering techniques, insider threats, identity theft, and countermeasures
- Network level attacks (sniffing, denial-of-service, and session hijacking) and countermeasures.
- Application-level attacks (web-server attacks, web application attacks, and SQL injection) and countermeasures
- Wireless encryption, wireless threats, and countermeasures
- Mobile platform attack vector, mobile device management, mobile security guidelines, and security tools
- IoT and OT concepts, attacks, and countermeasures
- Cloud computing technologies, cloud computing threats, attacks, and security techniques
- Fundamentals of pen testing
Exam Details
Training Details: Self-paced, in-demand lecture videos led by world-class instructors and hands-on labs.
Pre-requisite: No prior cybersecurity knowledge or IT work experience required.
- Exam Code: 112-52
- Number of Questions: 75
- Exam Availability: EC-Council Exam Portal
- Test Duration: 2 hours
- Test Format: Multiple Choice
- 750+ pages of ecourseware
Key Features
- 15+ hours of premium self-paced video training
- 11 lab activities in a simulated lab environment
- 750+ pages of ecourseware
- Capstone Projects with Real-World CTF Challenges
- Year-long access to courseware and 6-month access to labs
- Proctored exam voucher with one-year validity
- Increase your value in the job market to advance your career.
- Get globally recognized certification by EC-Council.
Brochure
Why EC-Council’s Essentials Series is the Most Popular and Fastest Growing Beginner Level Training Program for Career Starters and Career Changers
213,000+
Learners
Trust EC-Council’s
Essentials Series
150+
Countries
85+
Million Minutes
Watched
4.95/5.0
Average
Ratings
96.46%
of Learners
Gave a 5* Rating
Ethical Hacking Essentials
Course Outline
Module 01: Information Security Fundamentals
- Information Security Fundamentals
- Information Security Laws and Regulations
Module 02: Ethical Hacking Fundamentals
- Cyber Kill Chain Methodology
- Hacking Concepts and Hacker Classes
- Different Phases of Hacking Cycle
- Ethical Hacking Concepts, Scope, and Limitations
- Ethical Hacking Tools
Lab Exercise
- Passive Footprinting to Gather Information About a Target
- Network Scanning to Identify Live Hosts, Open Ports and Services and Target OS in the
Network - Enumeration on a System or Network to Extract Usernames, Machine Names, Network
Resources, Shares, etc.
Module 03: Information Security Threats and Vulnerability Assessment
Topics Covered:
- Threat and Threat Sources
- Malware and its Types
- Malware Countermeasures
- Vulnerabilities
- Vulnerability Assessment
Lab Exercise
- Vulnerability Assessment to Identify Security Vulnerabilities in the Target System or
Network
Module 04: Password Cracking Techniques and Countermeasures
Topics Covered:
- Password Cracking Techniques
- Password Cracking Tools
- Password Cracking Countermeasures
Lab Exercise
- Perform Active Online Attack to Crack the System’s Password
- Audit System Passwords
Module 05: Social Engineering Techniques and Countermeasures
- Social Engineering Concepts and its Phases
- Social Engineering Techniques
- Insider Threats and Identity Theft
- Social Engineering Countermeasures
Lab Exercise
- Social Engineering Using Various Techniques to Sniff Users’ Credentials
- Detect a Phishing Attack
Module 06: Network Level Attacks and Countermeasures
- Packet Sniffing Concepts
- Sniffing Techniques
- Sniffing Countermeasures
- DoS and DDoS Attacks
- DoS and DDoS Attack Countermeasures
- Session Hijacking Attacks
- Session Hijacking Attack Countermeasures
Lab Exercise
- Perform MAC Flooding to Compromise the Security of Network Switches
- Perform ARP Poisoning to Divert all Communication between Two Machines
- Detect ARP Attacks using ARP Spoofing Detection Tools to Ensure Data Privacy
- Perform DoS and DDoS Attacks using Various Techniques on a Target Host to Prevents Access to System Resources for Legitimate Users
- Detect and Protect Against DDoS Attack
- Perform Session Hijacking to Seize Control of a Valid TCP Communication Session Between Two Computers
- Detect Session Hijacking Attempts using Manual Method
Module 07: Web Application Attacks and Countermeasures
- Web Server Attacks
- Web Server Attack Countermeasures
- Web Application Architecture and Vulnerability Stack
- Web Application Threats and Attacks
- Web Application Attack Countermeasures
- SQL Injection Attacks
- SQL Injection Attack Countermeasures
Lab Exercise
- Perform a Web Server Attack to Crack FTP Credentials
- Perform a Web Application Attack to Compromise the Security of Web Applications to Steal Sensitive Information
- Perform SQL Injection Attacks on a Target Web Application to Manipulate the Backend Database
- Detect SQL Injection Vulnerabilities using SQL Injection Detection Tools
Module 08: Wireless Attacks and Countermeasures
- Wireless Terminology
- Wireless Encryption
- Wireless Network-Specific Attack Techniques
- Bluetooth Attacks
- Wireless Attack Countermeasures
Lab Exercise
- Perform Wi-Fi Packet Analysis
- Perform Wireless Attacks to Crack Wireless Encryption
Module 09: Mobile Attacks and Countermeasures
- Mobile Attack Anatomy
- Mobile Platform Attack Vectors and Vulnerabilities
- Mobile Device Management (MDM) Concept
- Mobile Attack Countermeasures
Lab Exercise
- Hack an Android Device by Creating Binary Payloads
- Secure Android Devices using Various Android Security Tools
Module 10: IoT and OT Attacks and Countermeasures
- IoT Concepts
- IoT Threats and Attacks
- IoT Attack Countermeasures
- OT Concepts
- OT Threats and Attacks
- OT Attack Countermeasures
Lab Exercise
- Perform Footprinting using Various Footprinting Techniques
- Capture and Analyze IoT Device Traffic
Module 11: Cloud Computing Threats and Countermeasures
- Cloud Computing Concepts
- Container Technology
- Cloud Computing Threats
- Cloud Attack Countermeasures
Lab Exercise
- Perform S3 Bucket Enumeration using Various S3 Bucket Enumeration Tools
- Exploit S3 Buckets
Module 12: Penetration Testing Fundamentals
- Fundamentals of Penetration Testing and its Benefits
- Strategies and Phases of Penetration Testing
- Guidelines and Recommendations for Penetration Testing